


default search action
Journal of Network and Computer Applications, Volume 76
Volume 76, December 2016
- Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos

, Ian Herwono:
Survey of approaches and features for the identification of HTTP-based botnet traffic. 1-15 - Laisen Nie, Dingde Jiang, Lei Guo

, Shui Yu
:
Traffic matrix prediction and estimation based on deep learning in large-scale IP backbone networks. 16-22 - Nazmus S. Nafi

, Khandakar Ahmed
, Mark A. Gregory
, Manoj Datta
:
A survey of smart grid architectures, applications, benefits and standardization. 23-36 - Qi Jiang

, Jianfeng Ma, Fushan Wei, Youliang Tian, Jian Shen
, Yuanyuan Yang:
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. 37-48 - Parisa Goudarzi, Hadi Tabatabaee Malazi

, Mahmood Ahmadi
:
Khorramshahr: A scalable peer to peer architecture for port warehouse management system. 49-59 - Chun-Nan Lu, Chun-Ying Huang

, Ying-Dar Lin, Yuan-Cheng Lai:
High performance traffic classification based on message size sequence and distribution. 60-74 - Ehsan Ahvar, Nafiseh Daneshgar-Moghaddam, Antonio Manuel Ortiz, Gyu Myoung Lee, Noël Crespi:

On analyzing user location discovery methods in smart homes: A taxonomy and survey. 75-86 - Ren-Hung Hwang

, Yu-Ling Hsueh
, Jang-Jiin Wu, Fu-Hui Huang:
SocialHide: A generic distributed framework for location privacy protection. 87-100 - Divya Saxena

, Vaskar Raychoudhury:
N-FIB: Scalable, memory efficient name-based forwarding. 101-109

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














